Outline. Vorlesung Telematik. Higher Layer Protocols: TCP/IP and ATM. Packet Switching. Higher Layers. Network Layer and Internetworking

Size: px
Start display at page:

Download "Outline. Vorlesung Telematik. Higher Layer Protocols: TCP/IP and ATM. Packet Switching. Higher Layers. Network Layer and Internetworking"

Transcription

1 Outline Network Layer and Internetworking Vorlesung Telematik Higher Layer Protocols: TCP/IP and ATM The TCP/IP protocol suit ATM MPLS Xiaoming Fu Telematics Group University of Goettingen Most slides were adopted from Eytan Modiano, MIT; some are adapted from Jim Kurose & Keith Ross "Computer Networking" (2nd ed) Slide 2 Higher Layers Packet Switching Application Application Virtual network service Presentation Presentation Virtual session Session Session Virtual link for end to end messages Transport Transport Virtual link for end to end packets Network Network Network Network Virtual link for reliable packets Data link Data link Control DLC DLC DLC DLC Control Virtual bit pipe physical physical interface phys. int. phys. int. phys. int. phys. int. interface Physical link External subnet subnet External Site node node site TCP, UDP IP, ATM Datagram packet switching Route chosen on packet-by-packet basis Different packets may follow different routes Packets may arrive out of order at the destination E.g., IP (The Internet Protocol) Virtual Circuit packet switching All packets associated with a session follow the same path Route is chosen at start of session Packets are labeled with a VC# designating the route The VC number must be unique on a given link but can change from link to link Imagine having to set up connections between nodes in a mesh Unique VC numbers imply Million VC numbers that must be represented and stored at each node E.g., ATM (Asynchronous transfer mode) Slide 3 Slide 4

2 Virtual Circuits Packet Switching The TCP/IP Protocol Suite For datagrams, addressing information must uniquely distinguish each network node and session Need unique source and destination addresses Transmission Control Protocol / Internet Protocol For virtual circuits, only the virtual circuits on a link need be distinguished by addressing Global address needed to set-up virtual circuit Once established, local virtual circuit numbers can then be used to represent the virtual circuits on a given link: VC number changes from link to link Merits of virtual circuits Save on route computation Need only be done once at start of session Save on header size More complex Less flexible 3 6 VC3 VC7 VC3 VC4 5 8 VC3 VC7 Node 5 table (3,5) VC3 -> (5,8) VC3 (3,5) VC7 -> (5,8) VC4 (6,5) VC3 -> (5,8) VC7 2 9 Developed by DARPA to connect Universities and Research Labs Four Layer model Applications Transport Network Link TCP - Transmission Control Protocol UDP - User Datagram Protocol IP - Internet Protocol Telnet, FTP, , etc. TCP, UDP IP, ICMP, IGMP Device drivers, interface cards Slide 5 Slide 6 Internetworking with TCP/IP Encapsulation FTP FTP Protocol FTP client server TCP TCP Protocol ROUTER IP IP Protocol IP Protocol IP Ethernet driver Ethernet Protocol Ethernet Ethernet driver token ring driver token ring Protocol token ring TCP IP token ring driver IP header TCP header TCP header IP datagram Appl header user data user data application data TCP segment application data Ethernet IP TCP Ethernet header header header application data trailer Ethernet frame 46 to 5 bytes Application TCP IP Ethernet driver Ethernet Slide 7 Slide 8

3 Bridges, Routers and Gateways Bridges, routers and gateways A Bridge is used to connect multiple LAN segments Layer 2 routing (Ethernet) Does not know IP address Varying levels of sophistication Simple bridges just forward packets smart bridges start looking like routers A Router is used to route connect between different networks using network layer address Within or between Autonomous Systems Using same protocol (e.g., IP, ATM) A Gateway connects between networks using different protocols Protocol conversion Address resolution Small company Ethernet A Bridge Ethernet B IP Router Gateway Service provider s ATM backbone Another provider s Frame Relay Backbone Gateway These definitions are often mixed and seem to evolve! ATM switches (routers) Slide 9 Slide IP addresses Host Names 32 bit address written as four decimal numbers One per byte of address (e.g., ) Hierarchical address structure Network ID/ Host ID/ Port ID Complete address called a socket Network and host ID carried in IP Header Port ID (sending process) carried in TCP header Each machine also has a unique name Domain name System: A distributed database that provides a mapping between IP addresses and Host names E.g., => IP Address classes: 8 32 Net ID Host ID Class A Nets 6 32 Net ID Host ID Class B Nets Net ID Host ID Class C Nets Class D is for multicast traffic Slide Slide 2

4 Internet Standards The Internet Protocol (IP) Internet Engineering Task Force (IETF) Development on near term internet standards Open body Meets 3 times a year Request for Comments (RFCs) Official internet standards Available from IETF web page: Routing of packet across the network Unreliable service Best effort delivery Recovery from lost packets must be done at higher layers Connectionless Packets are delivered (routed) independently Can be delivered out of order Re-sequencing must be done at higher layers Current version: V4 Next generation: V6 Add more addresses (4 byte header!) Ability to provide QoS and better security Slide 3 Slide 4 Header Fields in IP IP HEADER FIELDS Header Ver length type of service Total length (bytes) 6 - bit identification Flags 3 - bit fragment offset TTL Protocol Source IP Address Destination IP Address Options (if any) Data Header Checksum Note that the minimum size header is 2 bytes; TCP also has 2 byte header Vers: Version # of IP (current version is 4) HL: Header Length in 32-bit words Service: Mostly Ignored Total length Length of IP datagram ID Unique datagram ID Flags: NoFrag, More FragOffset: Fragment offset in units of 8 Octets TTL: Time to Live in "seconds or Hops Protocol: Higher Layer Protocol ID # HDR Cksum: 6 bit 's complement checksum (on header only!) SA & DA: Network Addresses Options: Record Route,Source Route,TimeStamp Slide 5 Slide 6

5 FRAGMENTATION POSITION OF FRAGMENT ethernet mtu=5 G X.25 MTU = 52 G ethernet mtu=5 Fragment offset field gives starting position of fragment within datagram in 8 byte increments (3 bit field) Length field in header gives the total length in bytes (6 bit field) Maximum size of IP packet 64K bytes A gateway fragments a datagram if length is too great for next network (fragmentation required because of unknown paths). Each fragment needs a unique identifier for datagram plus identifier for position within datagram A flag bit denotes last fragment in datagram IP reassembles fragments at destination and throws them away if one or more is too late in arriving In IP, the datagram ID is a 6 bit field counting datagram from given host Slide 7 Slide 8 IP Routing Subnet addressing Routing table at each node contains for each destination the next hop router to which the packet should be sent Not all destination addresses are in the routing table Look for net ID of the destination Prefix match Use default router Routers do not compute the complete route to the destination but only the next hop router IP uses distributed routing algorithms: RIP, OSPF In a LAN, the host computer sends the packet to the default router which provides a gateway to the outside world Class A and B addresses allocate too many hosts to a given net Subnet addressing allows us to divide the host ID space into smaller sub networks Simplify routing within an organization Smaller routing tables Potentially allows the allocation of the same class B address to more than one organization 32 bit Subnet Mask is used to divide the host ID field into subnets denotes a network address field denotes a host ID field 6 bit net ID 6 bit host ID Class B Address Subnet ID Host ID Mask Slide 9 Slide 2

6 Classless inter-domain routing (CIDR) Dynamic Host Configuration (DHCP) Class A and B addresses allocate too many hosts to an organization while class C addresses don t allocate enough This leads to inefficient assignment of address space Classless routing allows the allocation of addresses outside of class boundaries (within the class C pool of addresses) Allocate a block of contiguous addresses E.g., Bundles 6 class C addresses The first 2 bits of the address field are the same and are essentially the network ID Network numbers must now be described using their length and value (I.e., length of network prefix) Routing table lookup using longest prefix match Automated method for assigning network numbers IP addresses, default routers Computers contact DHCP server at Boot-up time Server assigns IP address Allows sharing of address space More efficient use of address space Adds scalability Addresses are least for some time Not permanently assigned Notice similarity to subnetting - supernetting Slide 2 Slide 22 Address Resolution Protocol IP addresses only make sense within IP suite Local area networks, such as Ethernet, have their own addressing scheme To talk to a node on LAN one must have its physical address (physical interface cards don t recognize their IP addresses) ARP provides a mapping between IP addresses and LAN addresses RARP provides mapping from LAN addresses to IP addresses This is accomplished by sending a broadcast packet requesting the owner of the IP address to respond with their physical address All nodes on the LAN recognize the broadcast message The owner of the IP address responds with its physical address An ARP cache is maintained at each node with recent mappings ARP IP Ethernet RARP Routing in the Internet The internet is divided into sub-networks, each under the control of a single authority known as an Autonomous System (AS) Routing algorithms are divided into two categories: Interior protocols (within an AS) Exterior protocols (between AS s) Interior Protocols use shortest path algorithms (more later) Distance vector protocols based on Bellman-ford algorithm Nodes exchange routing tables with each other E.g., Routing Information Protocol (RIP) Link state protocols based on Dijkstra s algorithm Nodes monitor the state of their links (e.g., delay) Nodes broadcast this information to all of the network E.g., Open Shortest Path First (OSPF) Exterior protocols route packets across AS s Issues: no single cost metric, policy routing, etc.. Routes often are pre-computed Example protocols: Exterior Gateway protocol (EGP) and Border Gateway protocol (BGP) Slide 23 Slide 24

7 IPv6 Effort started in 99 as IPng Motivation Need to increase IP address space Support for real time application - QoS Security, Mobility, Auto-configuration Major changes Increased address space (6 bytes) 5 IP addresses per sq. ft. of earth! Address partition similar to CIDR Support for QoS via Flow Label field Simplified header Most of the reasons for IPv6 have been taken care of in IPv4 Is IPv6 really needed? Complex transition from V4 to V6 3 ver class Flow label length nexthd Hop limit Source address Destination address Network Address Translation (NAT) Insufficient IP addresses for many organizations IPv6: but most applications run over IPv4 "Transient" solution: NAT Only one address can allow for a large amount of hosts Need to maintain a mapping <port #, private IP address> at NAT gateways NAT pros & cons advantages: no need to be allocated range of addresses from ISP; can change a device's address without notifying outside world; can change ISP without changing local devices' addresses; local devices are not addressable from outside Controversal: Routers should only process up to layer 3 (violates the "end2end" argument) Address shortage should be instead resolved by IPv6 Slide 25 Slide 26 User Datagram Protocol (UDP) NAT: Network Address Translation 2: NAT router changes datagram source addr from..., 3345 to , 5, updates table S: , 8 D: , 5 3 3: Reply arrives dest. address: , 5 Slide 27 NAT translation table WAN side addr LAN side addr , 5..., 3345 S: , 5 D: , S:..., 3345 D: , 8 S: , 8 D:..., : host... sends datagram to , : NAT router changes datagram dest addr from , 5 to..., 3345 Transport layer protocol Delivery of messages across network Datagram oriented Unreliable No error control mechanism Connectionless Not a stream protocol Max packet length 65K bytes UDP checksum Covers header and data Optional Can be used by applications UDP allows applications to interface directly to IP with minimal additional processing or protocol overhead Slide 28

8 UDP header format Transmission Control Protocol (TCP) IP Datagram IP header UDP header data 6 bit source port number 6 bit destination port number 6 bit UDP length 6 bit checksum Data The port numbers identifie the sending and receiving processes I.e., FTP, , etc.. Allow UDP to multiplex the data onto a single stream UDP length = length of packet in bytes Minimum of 8 and maximum of 2^6 - = 65,535 bytes Checksum covers header and data Optional, UDP does not do anything with the checksum Transport layer protocol Reliable transmission of messages Connection oriented Stream traffic Must re-sequence out of order IP packets Reliable ARQ mechanism Notice that packets have a sequence number and an ack number Notice that packet header has a window size (for Go Back N) Flow control mechanism Slow start Limits the size of the window in response to congestion Slide 29 Slide 3 Basic TCP operation TCP header fields At sender Application data is broken into TCP segments TCP uses a timer while waiting for an ACK of every packet Un-ACK d packets are retransmitted Source port Sequence number 6 32 Destination port At receiver Errors are detected using a checksum Correctly received data is acknowledged Segments are reassembled into their proper order Duplicate segments are discarded Window based retransmission and flow control Request number Data Offset Reserved Control Window Check sum Urgent pointer Options (if any) Data Slide 3 Slide 32

9 TCP header fields TCP error recovery Ports number are the same as for UDP 32 bit SN uniquely identify the application data contained in the TCP segment SN is in bytes! It identify the first byte of data 32 bit RN is used for piggybacking ACK s RN indicates the next byte that the received is expecting Implicit ACK for all of the bytes up to that point Data offset is a header length in 32 bit words (minimum 2 bytes) Window size Used for error recovery (ARQ) and as a flow control mechanism Sender cannot have more than a window of packets in the network simultaneously Specified in bytes Window scaling used to increase the window size in high speed networks Checksum covers the header and data Error recovery is done at multiple layers Link, transport, application Transport layer error recovery is needed because Packet losses can occur at network layer E.g., buffer overflow Some link layers may not be reliable SN and RN are used for error recovery in a similar way to Go Back N at the link layer Large SN needed for re-sequencing out of order packets TCP uses a timeout mechanism for packet retransmission Timeout calculation Fast retransmission Slide 33 Slide 34 TCP timeout calculation Fast Retransmit Based on round trip time measurement (RTT) Weighted average RTT_AVE = a*(rtt_measured) + (-a)*rtt_ave Timeout is a multiple of RTT_AVE (usually two) Short Timeout would lead to too many retransmissions Long Timeout would lead to large delays and inefficiency In order to make Timeout be more tolerant of delay variations it has been proposed (Jacobson) to set the timeout value based on the standard deviation of RTT Timeout = RTT_AVE + 4*RTT_SD In many TCP implementations the minimum value of Timeout is 5 ms due to the clock granularity When TCP receives a packet with a SN that is greater than the expected SN, it sends an ACK packet with a request number of the expected packet SN This could be due to out-of-order delivery or packet loss If a packet is lost then duplicate RNs will be sent by TCP until the packet it correctly received But the packet will not be retransmitted until a Timeout occurs This leads to added delay and inefficiency Fast retransmit assumes that if 3 duplicate RNs are received by the sending module that the packet was lost After 3 duplicate RNs are received the packet is retransmitted After retransmission, continue to send new data Fast retransmit allows TCP retransmission to behave more like Selective repeat ARQ Future option for selective ACKs (SACK) Slide 35 Slide 36

10 TCP congestion control Effect Of Window Size TCP uses its window size to perform end-to-end congestion control More on window flow control later Basic idea With window based ARQ the number of packets in the network cannot exceed the window size (CW) The window size is the number of bytes that are allowed to be in transport simultaneously WINDOW WASTED BW WINDOW Last_byte_sent (SN) - last_byte_ack d (RN) <= CW Transmission rate when using window flow control is equal to one window of packets every round trip time R = CW/RTT By controlling the window size TCP effectively controls the rate Too small a window prevents continuous transmission To allow continuous transmission window size must exceed round-trip delay time Slide 37 Slide 38 Length of a bit (traveling at 2/3C) Dynamic adjustment of window size At 3 bps bit = 45 miles 3 miles = 7 bits At 3.3 kbps bit = 38 miles 3 miles = 79 bits At 56 kbps bit = 2 miles 3 miles =.5 kbits At.5 Mbps bit = 438 ft. 3 miles = 36 kbits At 5 Mbps bit = 4.4 ft. 3 miles = 3.6 Mbits At Gbps bit = 8 inches 3 miles = 24 Mbits TCP starts with CW = packet and increases the window size slowly as ACK s are received Slow start phase Congestion avoidance phase Slow start phase During slow start TCP increases the window by one packet for every ACK that is received When CW = Threshold TCP goes to Congestion avoidance phase Notice: during slow start CW doubles every round trip time Exponential increase! Congestion avoidance phase During congestion avoidance TCP increases the window by one packet for every window of ACKs that it receives Notice that during congestion avoidance CW increases by every round trip time - Linear increase! TCP continues to increase CW until congestion occurs Slide 39 Slide 4

11 Reaction to congestion Understanding TCP dynamics Many variations: Tahoe, Reno, Vegas Basic idea: when congestion occurs decrease the window size There are two congestion indication mechanisms Duplicate ACKs - could be due to temporary congestion Timeout - more likely due to significant congstion TCP Reno - most common implementation Slow start phase is actually fast TCP spends most of its time in Congestion avoidance phase While in Congestion avoidance CW increases by every RTT CW decreases by a factor of two with every loss Additive Increase / Multiplicative decrease If Timeout occurs, CW = and go back to slow start phase If duplicate ACKs occur CW = CW/2 stay in congestion avoidance phase CW Saw-tooth Behavior Time Slide 4 Slide 42 Random Early Detection (RED) TCP Error Control Instead of dropping packet on queue overflow, drop them probabilistically earlier Motivation Dropped packets are used as a mechanism to force the source to slow down If we wait for buffer overflow it is in fact too late and we may have to drop many packets Leads to TCP synchronization problem where all sources slow down simultaneously RED provides an early indication of congestion Randomization reduces the TCP synchronization problem Mechanism Use weighted average queue size If AVE_Q > T min drop with prob. P If AVE_Q > T max drop with prob. RED can be used with explicit congestion notification rather than packet dropping RED has a fairness property Large flows more likely to be dropped Threshold and drop probability values are an area of active research P max T min Ave queue length T max SRP GO BACK N EFFICIENCY VS. BER WITH TCP WINDOW CONSTRAINT E-7 E-6 E-5 E-4 E-3 E-2 CHANNEL BER SEC R/T DELAY T- RATE BIT PACKETS Original TCP designed for low BER, low delay links Future versions (RFC 323) will allow for larger windows and selective retransmissions Slide 43 Slide 44

12 Impact of transmission errors on TCP congestion control TCP releases EFFICIENCY VS BER FOR TCP'S CONGESTION CONTROL KBPS KBPS,544 KBPS 64 KBPS..E-7.E-6.E-5.E-4.E-3 BER TCP assumes dropped packets are due to congestion and responds by reducing the transmission rate Over a high BER link dropped packets are more likely to be due to errors than to congestion TCP extensions (RFC 323) Fast retransmit mechanism, fast recovery, window scaling TCP standards are published as RFC s TCP implementations sometimes differ from one another May not implement the latest extensions, bugs, etc. The de facto standard implementation is BSD Computer system Research group at UC-Berkeley Most implementations of TCP are based on the BSD implementations SUN, MS, etc. BSD releases 4.2BSD First widely available release 4.3BSD Tahoe Slow start and congestion avoidance 4.3BSD Reno - 99 Header compression 4.4BSD Multicast support, RFC 323 for high performance Slide 45 Slide 46 The TCP/IP Suite Asynchronous Transfer Mode (ATM) ping Telnet& FTP Trace SMTP X DNS TFTP BOOTP SNMP Rlogin route TCP ICMP IP UDP IGMP RPC NFS 98 s effort by the phone companies to develop an integrated network standard (BISDN) that can support voice, data, video, etc. ATM uses small (53 Bytes) fixed size packets called cells Why cells? Cell switching has properties of both packet and circuit switching Easier to implement high speed switches Why 53 bytes? Small cells are good for voice traffic (limit sampling delays) For 64Kbps voice it takes 6 ms to fill a cell with data ATM networks are connection oriented Virtual circuits ARP Data Link RARP media Slide 47 Slide 48

13 ATM Reference Architecture ATM Cell format 5 Bytes 48 Bytes Upper layers Applications TCP/IP ATM adaptation layer Similar to transport layer Provides interface between upper layers and ATM Break messages into cells and reassemble ATM layer Cell switching Congestion control Physical layer ATM designed for SONET Synchronous optical network TDMA transmission scheme with 25 s frames Upper Layers ATM Adaptation Layer (AAL) ATM Physical ATM Cell Header Data Virtual circuit numbers (notice relatively small address space!) Virtual channel ID Virtual path ID PTI - payload type CLP - cell loss priority ( bit!) Mark cells that can be dropped HEC - CRC on header ATM Header (NNI) VPI 2 VPI VCI 3 VCI 4 5 VCI PTI HEC C L P Slide 49 Slide 5 VPI/VCI ATM HEADER CRC VPI identifies a physical path between the source and destination VCI identifies a logical connection (session) within that path Approach allows for smaller routing tables and simplifies route computation Private network ATM Backbone ATM uses an 8 bit CRC that is able to correct error It checks only on the header of the cell, and alternates between two modes In detection mode it does not correct any errors but is able to detect more errors In correction mode it can correct up to one error reliably but is less able to detect errors When the channel is relatively good it makes sense to be in correction mode, however when the channel is bad you want to be in detection mode to maximize the detection capability Private network Use VPI for switching in backbone Private network Use VCI to ID connection Within private network No detected errors Correct errors Detect double error Correct single error No detected errors Detect errors Detected errors Slide 5 Slide 52

14 ATM Service Categories ATM service parameters (examples) Constant Bit Rate (CBR) - e.g. uncompressed voice Circuit emulation Variable Bit Rate (rt-vbr) - e.g. compressed video Real-time and non-real-time Available Bit Rate (ABR) - e.g. LAN interconnect For bursty traffic with limited BW guarantees and congestion control Unspecified Bit Rate (UBR) - e.g. Internet ABR without BW guarantees and congestion control Peak cell rate (PCR) Sustained cell rate (SCR) Maximum Burst Size (MBS) Minimum cell rate (MCR) Cell loss rate (CLR) Cell transmission delay (CTD) Cell delay variation (CDV) Not all parameters apply to all service categories E.g., CBR specifies PCR and CDV VBR specifies MBR and SCR Network guarantees QoS provided that the user conforms to his contract as specified by above parameters When users exceed their rate network can drop those packets Cell rate can be controlled using rate control scheme (leaky bucket) Slide 53 Slide 54 Flow control in ATM networks (ABR) End-to-End RM-Cell Flow ATM uses resource management cells to control rate parameters Forward resource management (FRM) Backward resource management (BRM) RM cells contain Congestion indicator (CI) No increase Indicator (NI) Explicit cell rate (ER) Current cell rate (CCR) Min cell rate (MCR) Source generates RM cells regularly As RM cells pass through the networked they can be marked with CI= to indicate congestion RM cells are returned back to the source where CI = => decrease rate by some fraction CI = => Increase rate by some fraction ER can be used to set explicit rate ABR Source D BRM D D = data cell FRM = forward RM cell BRM = backward RM cell ABR Switch D FRM D ABR Switch At the destination the RM cell is turned around and sent back to the source D BRM FRM ABR Destin ation Slide 55 Slide 56

15 ATM Adaptation Layers Interface between ATM layer and higher layer packets Four adaptation layers that closely correspond to ATM s service classes AAL- to support CBR traffic AAL-2 to support VBR traffic AAL-3/4 to support bursty data traffic AAL-5 to support IP with minimal overhead The functions and format of the adaptation layer depend on the class of service. For example, stream type traffic requires sequence numbers to identify which cells have been dropped. Example: AAL 3/4 ATM CELL PAYLOAD (48 Bytes) ST SEQ MID LEN CRC Byte User Payload ST: Segment Type (st, Middle, Last) SEQ:4-bit sequence number (detect lost cells) MID: Message ID (reassembly of multiple msgs) 44 Byte user payload (~84% efficient) LEN: Length of data in this segment CRC: bit segment CRC Each class of service has A different header format (in addition to the 5 byte ATM header) USER PDU (DLC or NL) ATM CELL ATM CELL AAL 3/4 allows multiplexing, reliability, & error detection but is fairly complex to process and adds much overhead AAL 5 was introduced to support IP traffic Fewer functions but much less overhead and complexity Slide 57 Slide 58 ATM cell switches ATM summary ATM is mostly used as a core network technology Input Cell Processing Output ATM Advantages Cell Input 2 Processing Output 2 Switch Fabric Ability to provide QoS Ability to do traffic management Fast cell switching using relatively short VC numbers Input m Cell Processing Input Q's Design issues Input vs. output queueing Head of line blocking Fabric speed Control S/W Output Q's Output m ATM disadvantages It not IP - most everything was design for TCP/IP It s not naturally an end-to-end protocol Does not work well in heterogeneous environment Was not design to inter-operate with other protocols Not a good match for certain physical media (e.g., wireless) Many of the benefits of ATM can be borrowed by IP Cell switching core routers Label switching mechanisms Slide 59 Slide 6

16 Multi-Protocol Label Switching (MPLS) Label Switching As more services with fixed throughput and delay requirements become more common, IP will need virtual circuits (although it will probably call them something else) RG, April 28, 994 Router makers realize that in order to increase the speed and capacity they need to adopt a mechanism similar to ATM Switch based on a simple tag not requiring complex routing table look-ups Use virtual circuits to manage the traffic (QoS) Use cell switching at the core of the router First attempt: IP-switching Routers attempt to identify flows Define a flow based on observing a number of packets between a given source and destination (e.g., 5 packets within a second) Map IP source-destination pairs to ATM VC s Distributed algorithm where each router makes its own decision Multi-protocol label switching (MPLS) Also known as Tag switching Does not depend on ATM Add a tag to each packet to serve as a VC number Tags can be assigned permanently to certain paths Slide 6 Slide 62 Label switching can be used to create a virtual mesh with the core network References Routers at the edge of the core network can be connected to each other using labels Packets arriving at an edge router can be tagged with the label to the destination edge router Core network D TCP/IP Illustrated (Vols. &2), Stevens Computer Networks, 4th ed., Tenenbaum Tunneling Significantly simplifies routing in the core Computer networking, 2nd ed., Kurose and Ross Interior routers need not remember all IP prefixes of outside world D Allows for traffic engineering Assign capacity to labels based on demand Label switched routes Slide 63 Slide 64

17 Slide 65 7 bits 24 bits Class A netid hostid 4 bits 6 bits Class B netid hostid 2 bits 8 bits Class C netid hostid 28 bits Class D netid hostid 27 bits Class E (reserved for future use)

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Intermediate Traffic Management

Intermediate Traffic Management Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

TDTS06: computer Networks

TDTS06: computer Networks TDTS06: computer Networks Lecturer: Johannes Schmidt The slides are taken from the book s companion Web site with few modifications: Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2014/2015 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Network Layer: outline

Network Layer: outline Network Layer: outline 1 introduction 2 virtual circuit and datagram networks 3 what s inside a router 4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 5 routing algorithms link state

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th

More information

COMP211 Chapter 4 Network Layer: The Data Plane

COMP211 Chapter 4 Network Layer: The Data Plane COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane Chapter 4: outline 4.1 Overview of Network layer data plane control plane 4.2 What s inside a router 4.3 IP: Internet Protocol datagram format fragmentation IPv4

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy) ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

TCP/IP Networking. Part 4: Network and Transport Layer Protocols TCP/IP Networking Part 4: Network and Transport Layer Protocols Orientation Application Application protocol Application TCP TCP protocol TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Network Layer 4-1 Chapter 4: Network Layer Chapter

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer Overview, Router Design, IP Sec 4.1. 4.2 and 4.3 Prof. Lina Battestilli Fall 2017 Chapter 4: Network Layer, Data Plane chapter goals: understand

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11 1 Midterm exam Midterm this Thursday Close book but one-side 8.5"x11" note is allowed (must

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Network Layer: Data Plane 4-2

Network Layer: Data Plane 4-2 Network Layer: Data Plane EECS3214 18-02-25 4-1 Chapter 4: outline 4.1 Overview of Network layer data plane control plane 4.2 What s inside a router 4.3 IP: Internet Protocol datagram format fragmentation

More information

CMSC 332 Computer Networks Network Layer

CMSC 332 Computer Networks Network Layer CMSC 332 Computer Networks Network Layer Professor Szajda CMSC 332: Computer Networks Where in the Stack... CMSC 332: Computer Network 2 Where in the Stack... Application CMSC 332: Computer Network 2 Where

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer II Dmitri Loguinov Texas A&M University April 3, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter 4:

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)

More information

CPEG 514. Lecture 11 Asynchronous Transfer Mode (ATM) CPEG 514

CPEG 514. Lecture 11 Asynchronous Transfer Mode (ATM) CPEG 514 Lecture 11 Asynchronous Transfer Mode () Outline Introduction Virtual Circuit Setup PVC vs. SVC Quality of Service and Congestion Control IP over and Frame Relay interworking Network (integrated voice,

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009. Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Outline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles

Outline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles Outline Internet model Design principles Internet Protocol (IP) Transmission Control Protocol (TCP) Tze Sing Eugene Ng Department of Computer Science Carnegie Mellon University Tze Sing Eugene Ng eugeneng@cs.cmu.edu

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Data Communications & Networks. Session 7 Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communications & Networks. Session 7 Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communications & Networks Session 7 Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Internet Multicast Routing

Internet Multicast Routing Internet Multicast Routing. group addressing class D IP addresses 1110 Multicast Group ID. link layer multicast 28 bits. two protocol functions group management IGMP route establishment DVMRP, MOSPF, CBT,

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking A Top-Down Approach These slides are based on the slides made available by Kurose and Ross. All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information